Cryptology ePrint Archive: Report 2014/750
Available versions in chronological order
20140929:082939 (posted 29-Sep-2014 08:29:39 UTC)
Hardware Trojan Horses in Cryptographic IP Cores
Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage
Original publication (with minor differences): FDTC 2013
[
Cryptology ePrint archive
]